Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. It's comparable to other static analysis applications like RATS, SWAAT and flaw-finder while keeping the technical requirements to a minimum and being very flexible.
Who should use graudit?
System administrators, developers, auditors, vulnerability researchers and anyone else that cares to know if the application they develop, deploy or otherwise use is secure.
What languages are supported?
- Other (looks for suspicious comments, etc)
Graudit supports several options and tries to follow good shell practices. For a list of the options you can run graudit -h or see below. The simplest way to use graudit is;
Required: bash, grep, sed
The following options are available:
-A scan ALL files -c
number of lines of context to display, default is 2 -d database to use -h prints a short help text -i case in-sensitive search -l lists databases available -L vim friendly lines -v prints version number -x exclude these files -z supress colors -Z high contrast colors